You are here
Home > News > Technology

ALTR uses blockchain to protect data like it’s money

Interesting approach to the tokenisation of sensitive data...: [...] How it works Databases often have sensitive fields like bank accounts or social security numbers. The norm is to encrypt these. ALTR Protect takes the sensitive data, tokenizes it or renders it illegible, and then splits it up into pieces and scatters it across separate nodes or servers. Sikora observed: “So if one person got access to one node, they would only have access to one fragment of informati...

Standard to protect against BGP hijack attacks gets first official draft

Where is your traffic going? Could be anywhere, at least until one of the foundations of how the internet works is updated. In the meantime, make sure all communications are encrypted and all end points are authenticated...: [...] This week, a department called the National Cybersecurity Center of Excellence (NCCoE) at the US National Institute for Standards and Technology (NIST) published the first draft of a security standard that will secure the Border Gateway Protocol (B

7 Ways Blockchain is Being Used for Security

Ironically, one of the security problems of Blockchain technology is that the data can be read by anyone. That hasn't stopped many organisations investigating possible security uses. Read the full article for details...: The distributed ledger of blockchain has found application in many fields, from cryptocurrency to supply chain. Much of the excitement about blockchain is due to its reputation as an inherently secure technology. But can that inherent security be applied to

​Linus Torvalds talks frankly about Intel security bugs

The problem with hardware is that it's virtually impossible to do field upgrades...: At The Linux Foundation's Open Source Summit North America in Vancouver, Linus Torvalds, Linux's creator, and Dirk Hohndel, VMware VP and chief open source officer, had a wide-ranging conversation about Linux security, open-source developer, and quantum computing. Torvalds would really like his work to get back to being boring. It hasn't been lately because of Intel's CPU Meltdown and Spe

Overestimating WebAssembly’s Security Benefits Is Risky for Developers

Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser. Worth a watch...: NCC Group technical director Justin Engler and security consultant Tyler Lukasiewicz explain that while WebAssembly technology can promise both better performance and better security to developers, it also creates a new risk for native exploits in the browser. Filmed at the Dark Reading News Desk

VMware Pledges to Reduce Cybersecurity Costs

I'm a big fan of virtual desktops, virtual apps, and anything that keeps sensitive data secure. Good to see VMware playing the security card to push their wares...: VMware, at this week’s VMworld 2018 conference, signaled its intention to reduce dramatically the number of products and technologies required to secure an IT environment by eliminating sensors, agents and the need for physical boxes whenever possible. VMware CEO Pat Gelsinger told conference attendees organiz

How AI-enabled security can turn cyber novices into security ninjas

Ignore the flashy headline. ML/AI is not going to create a cyber warrior cohort in your organisation. However, there are some good ideas here so grab your pinch of salt and read on...: [...] To change this familiar pattern, we recommend a whole new approach for creating a threat detection skillset that is more creative, proactive and comprehensive. By implementing the following three strategies, security teams can become the ninja warriors, threat detectors and the proble

Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security

If you can ignore the stilted writing style, this is an interesting look at a practical implementation of ML to combat a security threat...: [...] The algorithms fare well compared to non-ML detection. Among the algorithms, Random Forest and decision trees stand top when measured from an intrusion detection viewpoint. The other three fare below them. In addition, as the attack traffic rises, the intrusion detection rate drops, which means DDoS is evident. Ultimately, ML

Containers or virtual machines: ​Which is more secure? The answer will surprise you

Interesting stuff. What the article doesn't mention is the relative sysadmin overhead of keeping multiple VMs up to date versus updating the platform that multiple containers are running on. Because of this one thing, my money is on containers being a better long term bet for operational security...: Are virtual machines (VM) more secure than containers? You may think you know the answer, but IBM Research has found containers can be as secure, or more secure, than VMs. Ja

Top